Follow
Chin-Tser Huang
Chin-Tser Huang
Professor of Computer Science and Engineering, University of South Carolina
Verified email at cse.sc.edu - Homepage
Title
Cited by
Cited by
Year
A computational approach for examining the roots and spreading patterns of fake news: Evolution tree analysis
SM Jang, T Geng, JYQ Li, R Xia, CT Huang, H Kim, J Tang
Computers in Human Behavior 84, 103-113, 2018
1752018
Security issues in privacy and key management protocols of IEEE 802.16
S Xu, M Matthews, CT Huang
Proceedings of the 44th annual Southeast regional conference, 113-118, 2006
1502006
A secure address resolution protocol
MG Gouda, CT Huang
Computer Networks 41 (1), 57-71, 2003
1162003
Chinese remainder theorem based group key management
X Zheng, CT Huang, M Matthews
Proceedings of the 45th annual southeast regional conference, 266-271, 2007
1082007
Attacks on PKM protocols of IEEE 802.16 and its later versions
S Xu, CT Huang
2006 3rd International Symposium on Wireless Communication Systems, 185-189, 2006
1062006
A moving-target defense strategy for cloud-based services with heterogeneous and dynamic attack surfaces
W Peng, F Li, CT Huang, X Zou
2014 IEEE International Conference on Communications (ICC), 804-809, 2014
1002014
Smart urban surveillance using fog computing
N Chen, Y Chen, S Song, CT Huang, X Ye
2016 IEEE/ACM symposium on edge computing (SEC), 95-96, 2016
912016
Wavelet-based real time detection of network traffic anomalies
CT Huang, S Thareja, YJ Shin
2006 securecomm and workshops, 1-7, 2006
852006
Multi-dimensional credentialing using veiled certificates
JH Gerdes Jr, J Kalvenes, CT Huang
US Patent 8,468,355, 2013
682013
A secure cookie protocol
AX Liu, JM Kovacs, CT Huang, MG Gouda
Proceedings. 14th International Conference on Computer Communications and …, 2005
682005
Responding to security issues in WiMAX networks
CT Huang, JM Chang
IT Professional 10 (5), 15-21, 2008
632008
Hop integrity in computer networks
MG Gouda, EN Elnozahy, CT Huang, TM McGuire
IEEE/ACM Transactions on Networking 10 (3), 308-319, 2002
612002
A hierarchical framework for secure and scalable EHR sharing and access control in multi-cloud
J Huang, M Sharaf, CT Huang
2012 41st international conference on parallel processing workshops, 279-287, 2012
502012
Smart city surveillance in fog computing
N Chen, Y Chen, X Ye, H Ling, S Song, CT Huang
Advances in mobile cloud computing and big data in the 5G era, 203-226, 2017
472017
Look-ahead routing and message scheduling in delay-tolerant networks
Y Xian, CT Huang, J Cobb
Computer Communications 34 (18), 2184-2194, 2011
462011
Using anomaly detection based techniques to detect HTTP-based botnet C&C traffic
MN Sakib, CT Huang
2016 ieee international conference on communications (icc), 1-6, 2016
392016
Efficient and secure multicast in wirelessman: A cross-layer design
CT Huang, M Matthews, M Ginley, X Zheng, C Chen, JM Chang
Journal of Communications Software and Systems 3 (3), 199-206, 2007
302007
Key trees and the security of interval multicast
MG Gouda, CT Huang, EN Elnozahy
Proceedings 22nd International Conference on Distributed Computing Systems …, 2002
302002
Improving transmission efficiency of large sequence alignment/map (SAM) files
MN Sakib, J Tang, WJ Zheng, CT Huang
PloS one 6 (12), e28251, 2011
292011
Fast and secure mobility for IEEE 802.16 e broadband wireless networks
CK Chang, CT Huang
2007 International Conference on Parallel Processing Workshops (ICPPW 2007 …, 2007
292007
The system can't perform the operation now. Try again later.
Articles 1–20